Profiles search
Skills
Identity Access Management (IAM), Identity Governance (IGA)
CyberArk, BeyondTrust, Azure, Privileged User Management,
Privileged Access Management (PAM), Vendor Access Management,
CIAM, Data Loss Protection, Zero Trust Architecture,
Consulting, Communication, Collaboration, Disaster Recovery, Business Continuity,
Mergers and Acquisitions (M&A), Integration,
Cloud Computing, SaaS, GRC,KPI/KRI, Risk Management, Controls,
Assessments, Planning, Leadership, Management, Architecture, NIST,
Program Management, Physical Security, Vulnerability and Patch Management,
Reports, Incident Response, Security Controls, Second line of Defense